Public Key Certification Service for Qualified Electronic Signatures
Total Page:16
File Type:pdf, Size:1020Kb
PUBLIC KEY CERTIFICATION SERVICE FOR QUALIFIED ELECTRONIC SIGNATURES PUBLIC KEY INFRASTRUCTURE (PKI) CERTIFICATION PRACTICE STATEMENT CERTIFICATE POLICY Version 1.3 - 30/10/2020 1. INTRODUCTION ......................................................................................................................................... 9 1.1 Overview ................................................................................................................................................ 9 1.2 Document name and identification ....................................................................................................... 10 1.3 PKI participants .................................................................................................................................... 11 1.3.1 Certification authorities ................................................................................................................. 11 1.3.2 Registration authorities ................................................................................................................. 12 1.3.3 Signatories and third parties ......................................................................................................... 14 1.3.4 Relying parties .............................................................................................................................. 16 1.3.5 Other participants ......................................................................................................................... 16 1.4 Certificate usage .................................................................................................................................. 16 1.5 Policy administration ............................................................................................................................ 17 1.6 Definitions and acronyms ..................................................................................................................... 17 2 PUBLICATION AND REPOSITORY RESPONSIBILITIES ........................................................................ 18 3 IDENTIFICATION AND AUTHENTICATION ............................................................................................. 19 3.1 Naming ................................................................................................................................................. 19 3.2 Initial identity validation ........................................................................................................................ 19 3.3 Identification and authentication for re-key requests ............................................................................ 20 3.4 Identification and authentication for revocation request ....................................................................... 21 4 CERTIFICATE LIFE-CYCLE OPERATIONAL REQUIREMENTS ............................................................. 22 4.1 Certificate Application ........................................................................................................................... 22 4.2 Certificate application processing ......................................................................................................... 23 4.3 Certificate issuance .............................................................................................................................. 23 4.4 Certificate acceptance .......................................................................................................................... 24 4.5 Key pair and certificate usage .............................................................................................................. 25 4.6 Certificate renewal ................................................................................................................................ 26 4.7 Certificate re-key .................................................................................................................................. 26 4.8 Certificate modification ......................................................................................................................... 27 4.9 Certificate revocation and suspension .................................................................................................. 28 4.10 Certificate status services .................................................................................................................. 32 4.11 End of subscription ............................................................................................................................ 32 4.12 Key escrow and recovery of CA keys ................................................................................................ 33 5 FACILITY, MANAGEMENT, AND OPERATIONAL CONTROLS .............................................................. 34 5.1 Physical controls .................................................................................................................................. 34 5.1.1 Site location and construction....................................................................................................... 34 5.1.2 Physical access ............................................................................................................................ 34 5.1.3 Power and air conditioning ........................................................................................................... 35 5.1.4 Water exposures .......................................................................................................................... 35 5.1.5 Fire prevention and protection ...................................................................................................... 35 5.1.6 Media storage ............................................................................................................................... 35 5.1.7 Waste disposal ............................................................................................................................. 36 5.1.8 Off-site backup ............................................................................................................................. 36 5.2 Procedural controls .............................................................................................................................. 36 5.3 Personnel controls ................................................................................................................................ 38 5.4 Audit logging procedures ...................................................................................................................... 39 5.5 Records archival ................................................................................................................................... 39 Version 1.3 - 30/10/2020 2 5.6 Key changeover ................................................................................................................................... 40 5.7 Compromise and disaster recovery ...................................................................................................... 40 5.8 CA termination ...................................................................................................................................... 41 6 TECHNICAL SECURITY CONTROLS ...................................................................................................... 42 6.1 Key pair generation and installation ..................................................................................................... 42 6.2 Private Key Protection and Cryptographic Module Engineering Controls ............................................. 44 6.3 Other aspects of key pairs management .............................................................................................. 46 6.4 Activation data ...................................................................................................................................... 46 6.5 Computer security controls ................................................................................................................... 47 6.6 Life Cycle Security Controls ................................................................................................................. 48 6.7 Network Security Controls .................................................................................................................... 48 6.8 Time-stamping ...................................................................................................................................... 50 7 CERTIFICATE, CRL, AND OCSP PROFILES .......................................................................................... 51 7.1 Certificate profile .................................................................................................................................. 51 7.2 CRL profile ........................................................................................................................................... 58 7.3 OCSP Profile ........................................................................................................................................ 59 8 COMPLIANCE AUDIT AND OTHER ASSESSMENTS ............................................................................. 60 8.1 Frequency or circumstances of assessment ........................................................................................ 60 8.2 Identity/qualifications of assessor ........................................................................................................